多项选择题
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。
A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10
相关考题
-
单项选择题
Refer to the exhibit.Based on the exhibited routing table,how will packets from a host within the192.168.10.192/26 LAN be forwarded to 192.168.10.1?()
A.The router will forward packets from R3 to R2 to R1
B.The router will forward packets from R3 to R1
C.The router will forward packets from R3 to R1 to R2
D.The router will forward packets from R3 to R2 to R1 AND from R3 to R1 -
多项选择题
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()
A.from host PC1 to host 5.1.1.10
B.from host PC1 to host 5.1.3.10
C.from host PC2 to host 5.1.2.10
D.from host PC2 to host 5.1.3.8 -
单项选择题
Refer to the exhibit.Which is the most efficient summarization that R1 can use to advertise its networks toR2?()
A.172.1.4.0/22
B.172.1.0.0/21
C.172.1.0.0/22
D.172.1.4.0/25 172.1.4.128/25 172.1.5.0/24 172.1.6.0/24 172.1.7.0/24
E.172.1.4.0/24 172.1.5.0/24 172.1.6.0/24 172.1.7.0/24
